"Security Researchers Win Second Tesla At Pwn2Own"

"Security Researchers Win Second Tesla At Pwn2Own"

A team of security researchers won a Tesla Model 3 and $200,000 for discovering a zero-day vulnerability in a vehicle's Electronic Control Unit (ECU). After one day of Pwn2Own Vancouver 2024, held by Trend Micro's Zero Day Initiative (ZDI), the Synacktiv team topped the leaderboard. Not much is known about the vulnerability because all bugs discovered during the competition are responsibly reported to the appropriate vendor for patching. However, it is known that the team used a single integer overflow flaw to exploit a Tesla ECU with Vehicle (VEH) CAN BUS Control.

Submitted by Gregory Rigby on

"New Bipartisan Bill Would Require Online Identification, Labeling of AI-Generated Videos and Audio"

"New Bipartisan Bill Would Require Online Identification, Labeling of AI-Generated Videos and Audio"

Artificial Intelligence (AI)-generated deepfakes can be difficult or impossible to distinguish from the real thing. AI has already been used to mimic voices, exploit celebrities' likenesses, and impersonate world leaders, raising concerns that it will lead to increased misinformation, consumer scams, and a widespread loss of trust. Therefore, recently introduced bipartisan legislation would require the identification and labeling of AI-generated online images, videos, and audio.

Submitted by Gregory Rigby on

46th International Conference on Software Engineering (ICSE 2024)

"The IEEE/ACM International Conference on Software Engineering, is the premier software engineering conference. Since 1975, ICSE provides a forum where researchers, practitioners, and educators gather together to present and discuss the most recent innovations, trends, experiences and issues in the field of software engineering."

Topics of interest include, but are not limited to security.

"AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials"

"AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials"

Researchers have detailed "AndroxGh0st," a tool used to target Laravel applications and steal sensitive data. It scans and extracts important information from .env files, revealing login information for Amazon Web Services (AWS) and Twilio. It is classified as an SMTP cracker, exploiting SMTP through different strategies, including credential exploitation, web shell deployment, and vulnerability scanning. Threat actors have been using AndroxGh0st to access Laravel .env files and steal credentials for cloud-based applications.

Submitted by Gregory Rigby on

"Fake Data Breaches: Countering the Damage"

"Fake Data Breaches: Countering the Damage"

Vitaly Simonovich, a threat intelligence researcher at Cato Networks, points out that even a fake data breach can have serious consequences. In February 2024, someone created a fake news story claiming a data breach at the Maine Attorney General's office, which tricked the Attorney General's office into posting it on its website. Epic Games fell victim to a fake data breach by a cybercrime group claiming it had stolen source code and sensitive user data. Simonovich emphasizes how such fabricated attacks cause panic and harm business reputations.

Submitted by Gregory Rigby on

"House Passes Bill Barring Sale of Personal Information to Foreign Adversaries"

"House Passes Bill Barring Sale of Personal Information to Foreign Adversaries"

The House of Representatives recently passed new legislation prohibiting data brokers from selling Americans' personal information to foreign adversary countries or entities under their control.  The bipartisan bill, known as the Protecting Americans' Data from Foreign Adversaries Act of 2024, was introduced on March 5 and passed by a vote of 414 – 0.  Previously, the bill passed out of the Energy and Commerce Committee with a vote of 50-0.

Submitted by Adam Ekwall on

"Hackers Claim to Have Breached Israeli Nuclear Facility's Computer Network"

"Hackers Claim to Have Breached Israeli Nuclear Facility's Computer Network"

An Iran-linked hacking group claims to have infiltrated a sensitive Israeli nuclear facility's computer network in an incident described by the hackers as a protest against the war in Gaza. The hackers say they stole and released thousands of documents from the Shimon Peres Negev Nuclear Research Center, including PDFs, emails, and PowerPoint slides. This article continues to discuss the hackers claiming to have breached an Israeli nuclear facility's computer network.

Submitted by Gregory Rigby on

"Evasive Sign1 Malware Campaign Infects 39,000 WordPress Sites"

"Evasive Sign1 Malware Campaign Infects 39,000 WordPress Sites"

The website security company Sucuri discovered a malware campaign dubbed "Sign1" that has infected more than 39,000 WordPress websites in the last six months, causing visitors to get unwanted redirects and popup ads. Instead of modifying the WordPress files, the threat actors inject the malware into custom HTML widgets and legitimate plugins on WordPress websites to insert the malicious Sign1 scripts. Sucuri researchers discovered the campaign when a client's website randomly displayed popup ads to visitors.

Submitted by Gregory Rigby on

"AWS Fixes 1-Click Apache Airflow Session Hijack Flaw"

"AWS Fixes 1-Click Apache Airflow Session Hijack Flaw"

Amazon Web Services (AWS) Managed Workflows for Apache Airflow (MWAA) had a vulnerability that enabled session hijacking with a single click. Tenable Research discovered the vulnerability, dubbed "FlowFixation," last year, which Amazon has since fixed. According to researchers, FlowFixation could have been exploited to gain access to another user's AWS MWAA web panel session by an attacker hosting malicious code on their own AWS domain, such as an Amazon API Gateway REST API instance they control.

Submitted by Gregory Rigby on
Subscribe to